General

  • Target

    9636fd63b744af45aa832210b7c882318116e174e5bd95d1d0f9144870460b2d

  • Size

    273KB

  • Sample

    241111-lkn2zaxdnj

  • MD5

    453db5a91d1bab7826041bb757fe7163

  • SHA1

    45c88cc20d305e32ee394c981fca7b364a561030

  • SHA256

    9636fd63b744af45aa832210b7c882318116e174e5bd95d1d0f9144870460b2d

  • SHA512

    fe4a9e8888aeeea2ede57efa44da8c1efc39c485ab515795aed0d3fe2c0c92d2c0da6746cf233db272fce75e0ce5bc1851c489674e553b0fec6f58b78ad31718

  • SSDEEP

    6144:bdqL9TqYimTVI7rSr3n8NJpH0HtDZkuuIgZuUjptNrmCdT6VwLB:ZqJTq0TwQ8NJpH0NFkuyN9frmCde6L

Malware Config

Extracted

Family

redline

Botnet

asia

C2

45.9.20.240:46257

Attributes
  • auth_value

    218353fc70f3440d970e02bf6e2edeb1

Targets

    • Target

      9636fd63b744af45aa832210b7c882318116e174e5bd95d1d0f9144870460b2d

    • Size

      273KB

    • MD5

      453db5a91d1bab7826041bb757fe7163

    • SHA1

      45c88cc20d305e32ee394c981fca7b364a561030

    • SHA256

      9636fd63b744af45aa832210b7c882318116e174e5bd95d1d0f9144870460b2d

    • SHA512

      fe4a9e8888aeeea2ede57efa44da8c1efc39c485ab515795aed0d3fe2c0c92d2c0da6746cf233db272fce75e0ce5bc1851c489674e553b0fec6f58b78ad31718

    • SSDEEP

      6144:bdqL9TqYimTVI7rSr3n8NJpH0HtDZkuuIgZuUjptNrmCdT6VwLB:ZqJTq0TwQ8NJpH0NFkuyN9frmCde6L

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

MITRE ATT&CK Enterprise v15

Tasks